You are on page 1of 25

ANEESHA K A Rno:30 S7 CS

OVERVIEW
INTRODUCTION

EXISTING SYSTEM
PROPOSED SYSTEM ADVANTAGES APPLICATIONS CONCLUSION

FUTURE SCOPE
REFERENCES

INTRODUCTION
VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES

Advanced system of encrypting data that combines the features of cryptography, steganography along with multimedia data hiding.

CRYPTOGRAPHY
What is Cryptography ?
Plain text Plain Text Encryption Decryption Cipher text Channel

Plain text

Encryption

Key

Encrypted Message

Decryption

TYPES OF CRYPTOGRAPHY:

STEGANOGRAPHY
Steganography- meaning concealed writing Definition- security through obscurity Advantage of steganography Visual steganography- Secure, implemented in

image files

STEGANOGRAPHIC MODEL

STEGANOGRAPHY
Commonly used techniques for image

steganography
Bit Insertion where the LSB of a pixel can be

modified. Modified Bit Encoding Technique each pixel will store one byte of data. Spread Spectrum Patch Work JPEG Compression, etc

MULTIMEDIA IMAGE FILES


Images are visual data stored in a picture

frame. Images are made up of various regions consisting of pixels. Pixels consist of three basic colors R (red), G (green) and B (blue). The pixel values (R, G, B values) can be manipulated to hide data in the images. The image can serve as a cover for the information to achieve steganography.

THE RGB COLOR MODEL

Primary colours- R-red, G-green, B-blue Secondary colours- R+G=yellow, G+B=cyan,

B+R=magenta Zero intensity- Black and Full intensityWhite

MULTIMEDIA IMAGE FILES


An image has 5 + 1 properties
Position of color pixel on the x-axis Position of color pixel in the y-axis R component of color G component of color B component of color image description properties like size, timestamp

etc.

These properties are stored in the first few

lines of image property description.

PROPOSED SYSTEM
The data will be encrypted into a cipher

(Cryptography). The cipher will be hidden into a multimedia image file in encrypted format (steganography). Traditional cryptographic techniques to achieve data encryption Visual steganography algorithms will be used to hide the encrypted data.

SYSTEM FLOW CHART


Message text Cipher text
Original multimedia content Truncated multimedia content Multimedia with message Added number from multimedia content Reference database Reference grid

Reference database Reference grid

Cipher text Message text

THE REFERENCE DATABASE


In order to provide higher security levels the algorithm is designed to use a reference database as shown in the figure. The reference database will consist of various

reference grids. Grids will have 3-d representation of encoding schema Characters will be represented by specific number

Encryption Algorithm
The message will first be encrypted The pixel values of the image are truncated Then a specific number which corresponds

to the 3-D representation of the character in the cipher code sequence can be added to this number

Encryption Algorithm (Contd..)


Only the edited message will be transmitted to

the receiver In the first few lines of image properties, the attributes of the image will be encrypted and saved The edited image will be transmitted to the receiver

Decryption Algorithm
The message can be decoded using the

receivers private key. The receivers private key is used to identify the reference grid from the reference database. The x and y components can define the block that has been used to encrypt the message. RGB value-point to the data in the block

Decryption Algorithm (Contd..)

The cipher is retrieved by obtaining the difference in the pixel value This cipher can now be decrypted using an inverse function of the DEA algorithm to get the message text

Matrix in a Grid of Reference Database

APPLICATIONS
in military and navy to make their

communication secure in payment gate way. in medical production system for secret products in business dealing and settlement contracts in electronic mail communication

FUTURE SCOPE
Video files and image streams can also be

used to transmit data.


In case of image streams part of message can

be sent in each image. This will increase the security of the system, however the time consumption will increase in this case.

REFERENCES